Gathering Threat Intelligence to Strengthen Security | HackerNoon

Canada News News

Gathering Threat Intelligence to Strengthen Security | HackerNoon
Canada Latest News,Canada Headlines
  • 📰 hackernoon
  • ⏱ Reading Time:
  • 342 sec. here
  • 7 min. at publisher
  • 📊 Quality Score:
  • News: 140%
  • Publisher: 51%

'Gathering Threat Intelligence to Strengthen Security' by hackernoon hackernoonpodcast techpodcasts

[00:00:01] Amy: code smarter, fixed faster, and be more secure with Sonatype, the software supply chain security platform that is trusted by over 15 million developers. Sonatype helps developers to embrace code quality and open source libraries with confidence so that they can achieve. 10 times faster feedback loops. Yeah. 10 times faster feedback loops.What's up hackers. Welcome back to another episode of the hacker noon pod.

I joined recorded future way back in 2017. And I've been here ever since. So, uh, that's kinda how I got. Yeah. Yeah. And I think in cyber security, it's one of those industries that people kind of don't want to. That they are overwhelmed, but they are. And so there's a lot of ego and there's a lot of, and so you have to factor that in as a sales engine. Yeah. You don't want to make the person feel like there's so much for them to do that.

[00:05:50] Amy: Right. So then how can we as business owners better understand what we're working with?[00:05:58] Nour: Um, I would say, I think we're very lucky right now that there's a lot of information about.

[00:07:10] Amy: But the thing is it's like Barry overwhelming. So imagine, I mean, hopefully small businesses or businesses, big businesses, especially, but small businesses have like at least some kind of grasp on their security at least to start with. You need some sort of fence, maybe an alarm system. Those are absolute basics. The equivalent of those in cybersecurity is basic network segmentation, firewall link endpoint agent. Uh, some sort of basic antivirus may be the ability to perform vulnerability scans, maybe IDs slash IPS, a good proxy, a good gateway.

So for example, you are looking at a long list of IP addresses in your firewall, and you're not even sure which one to block, which one to pay attention to which one to investigate, you need some sort of external opinion on those. You can gather intelligence and then the intelligence comes to you, uh, fresh it's timely, it's accurate.

That weren't important. So it's very, it's very useful and actually quite game-changing to be able to bring in intelligence and then apply it locally within your environment. And it sounds like it's an advanced, but if you think about the everyday world, we do that all the time. We gather intelligence all the time.

Is it the fact that maybe I'm seeing a lot of fake websites being generated with my logo on them? So for example, if you're a Nike or if you're a. Or Amazon every single day, someone is trying to create a fake page with your logo on it. And that has maybe troublesome for you. And it creates a lot of fraud and maybe it's swindling a lot of your customers.

[00:13:28] Amy: Yeah, no, definitely. And now let me ask you this. What kind of people are the people who know how to do this stuff? That's a sign that your intelligence provider is doing their job, because if they're not, then they're making it even more difficult for you. So I hope that I hope that answered your yeah,

Okay. You have a bunch of, of it staff and your. And you hire them to run the network and just the day-to-day routing and switching and wireless. And then one day the business decides that cybersecurity is a priority and you didn't have the time to go out and hire someone specifically. So you took one of your it guys or girls, or maybe two of them.

That's an ideal world. And I think as a profession, we need to converge to the same point where it's not, oh, I am, I'm a firewall. Oh, sorry. I'm a, I'm a wireless expert. I only know wireless, but then I know how to secure wireless. There should be the same person. Maybe I'm wrong, but I think it would cure the biggest problem we have in cybersecurity now, which is shortage of talent.

And I got the exact same question and I said, and I still say this all the time, which is you are one online course away from being a cybersecurity professional. And that is it. You are one good cybersecurity course from being a way to understand being, sorry, let me say that again. You're one cybersecurity course away from being able to understand.

Um, a low maturity. I don't know what the, what the proper way to say that is, is that someone who's maybe fresh to cybersecurity is frustrated. Intelligence doesn't really have the pieces together in their head. And then a very mature client or prospect is someone who really understands that it has a fully fledged.

Right. And so in cybersecurity, if you plan. For, for, for just protecting yourselves against apt groups, you're basically preventing your planning for the most rare unavoidable high-risk scenario. When there are so many other things you could have protected yourself against in that same day, like opportunistic ransomware, like phishing, like misconfiguration within your.

They are financially motivated. They do not care if it's Amy or if it's new, or if it's my grandmother, as long as that person can pay, that's what they care about. So they don't care if it's at the largest pastor manufacturer in the world. Or if it's Airbus or if it's Microsoft, they don't care. As long as that person is going to pay up.

And that's a daily occurrence. Wait. Okay. So like our people are criminal just being like, Hey guys. So like we've got some of your data now. Like, so do these cyber criminals actually. We'll have to then like email companies and be like, Hey, we have your data. [00:25:57] Amy: Interesting. Okay. I find that fascinating. I never thought about like the logistics,

So I remember a time where $1 million was a lot. Now we're seeing like 5, 6, 7, 10 million. Exactly. So, and I think, I think they know eventually who their target is. So they're not going to ask you or me for like $10 million, but they'll ask for an enterpriseBigger. Are we talking like, are people actually going to ransom for 50

[00:28:14] Amy: Okay. Imagine though, wait, imagine you're in a job interview and they're like, tell me about your previous positions and you have to be like, I, I worked at the help desk at a criminal organization.[00:28:30] Nour: Now you've turned a new leaf and now you've realized that very unlikely, very unlikely. But that would be, I would say, I wouldn't say, think about this. How much did I say around some was on the higher, like 20 million,[00:28:47] Nour: Okay.

[00:29:48] Amy: Do you think that big company is like, you know, Nike or something who experienced ransomware frequently have budget set aside.[00:30:00] Nour: Um, I think they have budgets set aside for any sort of risk mitigation, so they must have, um, contingents in the market. See, what's the word I'm looking for? Um, you know, break this glass if[00:30:16] Nour: oh, I'm sure. There's. Um, and th there's money set aside for disaster recovery.

Just like a castle or a house. You know, there's so many things that are so basic that could prevent a lot of the things that might occur.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

hackernoon /  🏆 532. in US

Canada Latest News, Canada Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

Deputies protect school killer after potential juror threatDeputies protect school killer after potential juror threatA 70-member pool of potential jurors was filing into the courtroom and taking their seats when one of the first to enter, a man in his 30s, began “mouthing expletives” toward Cruz, Circuit Judge Elizabeth Scherer said.
Read more »

Deputies protect Parkland shooter Nikolas Cruz in court after juror threatDeputies protect Parkland shooter Nikolas Cruz in court after juror threatThe man who was mouthing at Cruz then started looking over his shoulder at the defendant, leading deputies to fear he would run towards the 23-year-old and be followed by others.
Read more »

Deputies protect school killer after potential juror threatDeputies protect school killer after potential juror threatDeputies protecting Florida school shooter Nikolas Cruz had to pull him aside and surround him after members of a jury pool became potentially threatening.
Read more »

With species under threat, orphaned rhinos in South Africa have baby for 1st timeWith species under threat, orphaned rhinos in South Africa have baby for 1st timeOver the past decade, rhino numbers have decreased dramatically. Now, it’s a race against time to save the species, which experts believe could become extinct within as little as five years.
Read more »

Deputies Protect School Killer After Potential Juror ThreatDeputies Protect School Killer After Potential Juror ThreatFlorida deputies protecting the Parkland school shooting gunman had to pull him aside and surround him Tuesday after a member of a jury pool mouthed possible threats toward him and caused others to become “excited,” leading them to fear a potential brawl, officials said.
Read more »

Attacks Begin in New Country as Russia Warns Nuclear Threat Is ‘Real’Attacks Begin in New Country as Russia Warns Nuclear Threat Is ‘Real’Ukrainian officials believe Russia is launching “false flag” operations in the pro-Russian rebel-controlled enclave of Transnistria in order to justify widening their imperial assault into a second nation.
Read more »



Render Time: 2025-03-10 17:13:36